Search results

1 – 10 of 12
Article
Publication date: 9 January 2018

Brendan M. O’Mahony, Becky Milne and Kevin Smith

Intermediaries facilitate communication with many types of vulnerable witnesses during police investigative interviews. The purpose of this paper is to find out how intermediaries…

2130

Abstract

Purpose

Intermediaries facilitate communication with many types of vulnerable witnesses during police investigative interviews. The purpose of this paper is to find out how intermediaries engage in their role in cases where the vulnerable witness presents with one type of vulnerability, namely, dissociative identity disorder (DID).

Design/methodology/approach

In phase 1, data were obtained from the National Crime Agency Witness Intermediary Team (WIT) to ascertain the demand for intermediaries in DID cases in England and Wales within a three-year period. In phase 2 of this study four intermediaries who had worked with witnesses with DID completed an in-depth questionnaire detailing their experience.

Findings

Referrals for DID are currently incorporated within the category of personality disorder in the WIT database. Ten definite DID referrals and a possible additional ten cases were identified within this three-year period. Registered Intermediary participants reported having limited experience and limited specific training in dealing with DID prior to becoming a Registered Intermediary. Furthermore, intermediaries reported the many difficulties that they experienced with DID cases in terms of how best to manage the emotional personalities that may present.

Originality/value

This is the first published study where intermediaries have shared their experiences about DID cases. It highlights the complexities of obtaining a coherent account from such individuals in investigative interviews.

Article
Publication date: 8 June 2012

Brendan M. O'Mahony

This paper's aim is to examine the interaction between an intermediary, a vulnerable defendant and barristers and the judge in a courtroom. The paper seeks to consider how the…

764

Abstract

Purpose

This paper's aim is to examine the interaction between an intermediary, a vulnerable defendant and barristers and the judge in a courtroom. The paper seeks to consider how the communication needs of vulnerable defendants, such as those with learning disabilities, should be addressed in the criminal justice system.

Design/methodology/approach

The paper considers the legal landscape for dealing with vulnerable defendants. A case example and court and police interview transcripts are then used to illustrate some of the communication needs of vulnerable people in the criminal justice system.

Findings

The paper highlights the complexities of the language that is used by lawyers in the courtroom and the difficulties that this can cause for a vulnerable defendant. Additionally, this paper reveals the difficulties that the police caution can present to a vulnerable suspect in custody.

Social implications

Vulnerable witnesses or defendants may be disadvantaged in understanding questions and the implications of answers that they provide in a courtroom or in attendance at a police station. The criminal justice system should support these individuals and provide guidance and training to professionals. The author identifies a need for more research in this area.

Originality/value

This is one of the first published papers to examine the interaction between an intermediary, a vulnerable defendant and barristers and the judge in the courtroom. The paper considers how the communication needs of vulnerable defendants should be addressed in the criminal justice system.

Details

Journal of Learning Disabilities and Offending Behaviour, vol. 3 no. 2
Type: Research Article
ISSN: 2042-0927

Keywords

Article
Publication date: 9 May 2016

Brendan M. O'Mahony, Jane Creaton, Kevin Smith and Rebecca Milne

– The purpose of this paper is to find out how intermediaries interpret their role working with vulnerable defendants at court.

Abstract

Purpose

The purpose of this paper is to find out how intermediaries interpret their role working with vulnerable defendants at court.

Design/methodology/approach

In this study six intermediaries who have worked with defendants were interviewed using a semi-structured interview and the interview transcripts were analysed using interpretative phenomenological analysis.

Findings

Intermediaries appeared to be trying to make sense of their developing identities as professionals in the courtroom and this theme is conceptualised through social identity complexity theory.

Practical implications

Health and care professionals undertaking a new function in the criminal justice sector should receive training about the psychological processes underlying developing professional identities. Such training should reduce the cognitive load when they work in the new environment and failure to undertake this training may lead to less efficient practice. Gaining an understanding of their professional positioning within the court environment may assist with retention of intermediaries in this new role.

Originality/value

This is the first published study where intermediaries have been interviewed about their experiences with defendants. Recommendations are made including the requirement for additional training for intermediaries to understand the underlying psychological processes and conflicts they may experience when working with defendant cases.

Details

Journal of Forensic Practice, vol. 18 no. 2
Type: Research Article
ISSN: 2050-8794

Keywords

Article
Publication date: 18 May 2011

Brendan M. O'Mahony, Kevin Smith and Becky Milne

The purpose of this paper is to examine how Registered Intermediaries are used in the England and Wales to facilitate communication between vulnerable witnesses, victims and…

1983

Abstract

Purpose

The purpose of this paper is to examine how Registered Intermediaries are used in the England and Wales to facilitate communication between vulnerable witnesses, victims and police investigators and criminal courts.

Design/methodology/approach

The paper focuses on the need for early identification of the vulnerable person so that support measures can be put in place from the outset to assist them to provide their testimony.

Findings

It is noted that real progress has been made by the introduction of legislation, specifically the Youth Justice and Criminal Evidence Act (1999), and the uptake by the police service of the subsequent special measures put in place. However, the criminal justice service cannot afford to be complacent as research demonstrates that the police and the courts need to be more effective in managing these issues.

Originality/value

The paper recommends that support measures are widened to include witnesses and suspects being interviewed by the Independent Police Complaints Commission, HM Customs and Revenue, the Department of Health and the Department of Work and Pensions.

Details

The British Journal of Forensic Practice, vol. 13 no. 2
Type: Research Article
ISSN: 1463-6646

Keywords

Content available
1108

Abstract

Details

The British Journal of Forensic Practice, vol. 13 no. 2
Type: Research Article
ISSN: 1463-6646

Content available
Article
Publication date: 8 June 2012

Colin Dale

1054

Abstract

Details

Journal of Learning Disabilities and Offending Behaviour, vol. 3 no. 2
Type: Research Article
ISSN: 2042-0927

Open Access
Article
Publication date: 23 September 2021

Damian Gordon, Ioannis Stavrakakis, J. Paul Gibson, Brendan Tierney, Anna Becevel, Andrea Curley, Michael Collins, William O’Mahony and Dympna O’Sullivan

Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of…

3716

Abstract

Purpose

Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of that scope it is essential to incorporate a range of perspectives, from a range of stakeholders, on current and emerging ethical challenges associated with computer technology. This study aims to achieve this by using, a three-pronged, stakeholder analysis of Computer Science academics, ICT industry professionals, and citizen groups was undertaken to explore what they consider to be crucial computing ethics concerns. The overlap between these stakeholder groups are explored, as well as whether their concerns are reflected in the existing literature.

Design/methodology/approach

Data collection was performed using focus groups, and the data was analysed using a thematic analysis. The data was also analysed to determine if there were overlaps between the literature and the stakeholders’ concerns and attitudes towards computing ethics.

Findings

The results of the focus group analysis show a mixture of overlapping concerns between the different groups, as well as some concerns that are unique to each of the specific groups. All groups stressed the importance of data as a key topic in computing ethics. This includes concerns around the accuracy, completeness and representativeness of data sets used to develop computing applications. Academics were concerned with the best ways to teach computing ethics to university students. Industry professionals believed that a lack of diversity in software teams resulted in important questions not being asked during design and development. Citizens discussed at length the negative and unexpected impacts of social media applications. These are all topics that have gained broad coverage in the literature.

Social implications

In recent years, the impact of ICT on society and the environment at large has grown tremendously. From this fast-paced growth, a myriad of ethical concerns have arisen. The analysis aims to shed light on what a diverse group of stakeholders consider the most important social impacts of technology and whether these concerns are reflected in the literature on computing ethics. The outcomes of this analysis will form the basis for new teaching content that will be developed in future to help illuminate and address these concerns.

Originality/value

The multi-stakeholder analysis provides individual and differing perspectives on the issues related to the rapidly evolving discipline of computing ethics.

Details

Journal of Information, Communication and Ethics in Society, vol. 20 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Abstract

Details

Histories of Punishment and Social Control in Ireland: Perspectives from a Periphery
Type: Book
ISBN: 978-1-80043-607-7

Article
Publication date: 23 September 2014

Brendan K. O’Rourke

The purpose of this article is to provide a method of gaining transdisciplinary insight by focusing on keywords in the language we use. The language of economics dominates…

2916

Abstract

Purpose

The purpose of this article is to provide a method of gaining transdisciplinary insight by focusing on keywords in the language we use. The language of economics dominates discourse about the economy. Analyzing this discourse from a great variety of perspectives has blossomed but promises much more. The study of the keyword “entrepreneur” illustrates the strengths and weaknesses of this diversity of perspectives, and also points to some possible opportunities for enhancing the quality of their interaction.

Design/methodology/approach

A broad discourse analytic approach is drawn upon to understand the role the language of mainstream economics plays in our discussions of the economy, to trace the keyword “entrepreneur” as it has been and is used in economics and more general conversations about the economy and to use a keyword approach to create a transdisciplinary understanding of the way the economy is discussed.

Findings

Economics in the sense of the mainstream approach that adopts the rational narrowly self-interested, calculating and decontextualized individual as its default assumption is a very particular language that has detrimentally dominated discussions of the economy. “Entrepreneur” is a keyword, the use of which in economics has both strengthened and put constraints on the way it can be deployed in talking about the economy. Focusing on keywords in the language, we use can provide a method of gaining transdisciplinary insight.

Research limitations/implications

A short article with such a broad sweep such as this no doubts illustrates the limits imposed by attempts at transdisciplinary communication, but a potential gain from any such interaction is that we might grow to have more informed and genuinely dialogic interactions about the economy. As another way to attempt communication across diverse positions, looking at keywords in the discourse about the economy seems profitable.

Social implications

Discourses of economics and the entrepreneur play a huge role in how people construct their roles and representations in the economy. Producing critical and creative understandings of these discourses that allow social actors to benefit from the diversity of completed and potential research work seems imperative in a world facing our current economic and social problems.

Originality/value

Discourse analysis of the economy, the entrepreneur and economics has produced many insights but these insights have remained stranded in intellectual niches. As studies of language and the economy continue to blossom this article stresses the need, and points to some opportunities, for more fruitful interaction, by adopting a keyword approach.

Details

On the Horizon, vol. 22 no. 4
Type: Research Article
ISSN: 1074-8121

Keywords

Article
Publication date: 12 August 2022

Neha Chhabra Roy and Sreeleakha Prabhakaran

The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian…

1046

Abstract

Purpose

The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian banks. The authors attempted to identify and classify cyber frauds and its drivers and correlate them for optimal mitigation planning.

Design/methodology/approach

The methodology opted for the identification and classification is through a detailed literature review and focus group discussion with risk and vigilance officers and cyber cell experts. The authors assessed the future of cyber fraud in the Indian banking business through the machine learning–based k-nearest neighbor (K-NN) approach and prioritized and predicted the future of cyber fraud. The predicted future revealing dominance of a few specific cyber frauds will help to get an appropriate fraud prevention model, using an associated parties centric (victim and offender) root-cause approach. The study uses correlation analysis and maps frauds with their respective drivers to determine the resource specific effective mitigation plan.

Findings

Finally, the paper concludes with a conceptual framework for preventing internal-led cyber fraud within the scope of the study. A cyber fraud mitigation ecosystem will be helpful for policymakers and fraud investigation officers to create a more robust environment for banks through timely and quick detection of cyber frauds and prevention of them.

Research limitations/implications

Additionally, the study supports the Reserve Bank of India and the Government of India's launched cyber security initiates and schemes which ensure protection for the banking ecosystem i.e. RBI direct scheme, integrated ombudsman scheme, cyber swachhta kendra (botnet cleaning and malware analysis centre), National Cyber Coordination Centre (NCCC) and Security Monitoring Centre (SMC).

Practical implications

Structured and effective internal-led plans for cyber fraud mitigation proposed in this study will conserve banks, employees, regulatory authorities, customers and economic resources, save bank authorities’ and policymakers’ time and money, and conserve resources. Additionally, this will enhance the reputation of the Indian banking industry and extend its lifespan.

Originality/value

The innovative insider-led cyber fraud mitigation approach quickly identifies cyber fraud, prioritizes it, identifies its prominent root causes, map frauds with respective root causes and then suggests strategies to ensure a cost-effective and time-saving bank ecosystem.

Details

Aslib Journal of Information Management, vol. 75 no. 2
Type: Research Article
ISSN: 2050-3806

Keywords

1 – 10 of 12